Abstract

We demonstrate how the 5G network slicing model can be enhanced to address data security requirements. In this work, we demonstrate two different slice configurations, with different encryption requirements, representing two diverse use-cases for 5G networking, namely, an enterprise application hosted at a metro network site and a content delivery network. We create a modified software-defined networking (SDN) orchestrator that calculates and provisions network slices according to the requirements, including encryption backed by quantum key distribution (QKD) and other methods. Slices are automatically provisioned by SDN orchestration of network resources, allowing selection of encrypted links as appropriate, including those that use encryption with standard Diffie–Hellman key exchange, QKD, or quantum-resistant algorithms, as well as no encryption at all. We show that the setup and teardown times of the network slices take approximately 1–2 min, which is at least an order of magnitude improvement over manually provisioning a link today.

© 2021 Optical Society of America

Full Article  |  PDF Article
More Like This
Hybrid Conventional and Quantum Security for Software Defined and Virtualized Networks

Alejandro Aguado, Victor Lopez, Jesus Martinez-Mateo, Thomas Szyrkowiec, Achim Autenrieth, Momtchil Peev, Diego Lopez, and Vicente Martin
J. Opt. Commun. Netw. 9(10) 819-825 (2017)

Monitoring and Physical-Layer Attack Mitigation in SDN-Controlled Quantum Key Distribution Networks

Emilio Hugues-Salas, Foteini Ntavou, Dimitris Gkounis, George T. Kanellos, Reza Nejabati, and Dimitra Simeonidou
J. Opt. Commun. Netw. 11(2) A209-A218 (2019)

Availability-guaranteed slice composition for service function chains in 5G transport networks

Riti Gour, Genya Ishigaki, Jian Kong, and Jason P. Jue
J. Opt. Commun. Netw. 13(3) 14-24 (2021)

References

You do not have subscription access to this journal. Citation lists with outbound citation links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Cited By

You do not have subscription access to this journal. Cited by links are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription

Figures (7)

You do not have subscription access to this journal. Figure files are available to subscribers only. You may subscribe either as an OSA member, or as an authorized user of your institution.

Contact your librarian or system administrator
or
Login to access OSA Member Subscription